The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
Cybersecurity
Emails that are fake and want you to click on a link to give you malware
Phishing
What can you use to find computers connected to the internet
shodan
Causes pop-up and pop-under advertisements on user's system. Often installs with bundles of freeware programs or when visiting a web site with it running in the background.
Adware
People may perform network penetration tests in attempt to compromise networks and systems by using their knowledge of computer security systems to discover network vulnerabilities
white hat hackers
A point at which there is potential for a security breach
Vulnerability
Some danger that can exploit a vulnerability
Threat
This is a method of access control by which users must present multiple, separate pieces of identification, such as a password and keycard, in order to access a system
multi-factor authentication
records the activities of the user, such as the passwords they type into the computer and transmits this information to the person who wrote the malware
spyware
Hackers primary motivation is to find weaknesses in a companies security to then either get paid by the company or to expose the weakness to other hackers
Gray hat hacker
This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets)
Denial of Service (DDoS)
A certain type of social engineering technique that manipulates victims into revealing information.
Pretexting
This service allows users to remain anonymous, masking their identity/location and encrypts traffic.
VPN
The practice of redirecting the users to a fake website that mimics the appearance of a legitimate one, with the goal of stealing personal information such as passwords, account numbers, and other personal information.
Pharming
This hacker's primary motivation is financial/personal gain
Black hat hacker
Someone who hacks for a protest against the government
Hacktivist
An independent malware program that self-replicates in order to spread from machine to machine to cause damage.
worm
Computer software used to prevent, detect and remove malicious software
antivirus
malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action
ransomware
Willing to perform an attack for a “cause” even if it means they get caught
Suicide Hackers